Monday, August 3, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST

Uncategorized

Comment Crew group of hackers has been identified during an attack…

0
Aug 13, 2013, 11:30 am ESTChinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA.The Comment Crew group of hackers has been identified during an attack to a fake...

DNS impairment redirects thousands of websites to malware

0
Aug 12, 2013, 11:30 am ESTCyber-criminals are exploiting the possibility of DNS impairment to redirects visitors of thousands legitimate websites to compromised domains used to serve malware.DNS impairment or rather compromising DNS to distribute malicious code, cyber criminals are very attracted by the possibility to...

FBI is using mobile Android malware to spy on suspect

0
Aug 09, 2013, 11:30 am ESTFormer FBI officers revealed to the Wall Street Journal the existence of FBI Android malware that is used to spy on suspects for investigations.The FBI is using mobile Android malware to spy on suspects for its...

Vulnerability in Windows Phone OS could allow information disclosure

0
Aug 08, 2013, 11:00 am ESTMicrosoft Security Advisory reveals vulnerability in Windows Phone OS that could allow information disclosure.Microsoft has issued a security advisory related to vulnerability in Windows Phone OS that could allow information disclosure, the flaw is related toWireless PEAP-MS-CHAPv2 Authentication used...

Breach, the new attack techniques against SSL TSL

0
Aug 07, 2013, 11:00 am ESTThe HTTPS cryptographic scheme is menaced by the BREACH attack that allows hackers to capture security credentials, email addresses and much more from encrypted pages, often in as little as 30 seconds.Breach (Browser Reconnaissance and...

Cyber espionage – White House employees personal email hacked

0
Aug 06, 2013, 11:00 am ESTAt least three White House employees personal Gmail accounts hacked by the popular group of hackers know as Syrian Electronic Army (SEA).White House employee’s personal email hacked; it is happened to three staffers that suffered data...

XKeyscore, revealed another surveillance tool used by NSA

0
Aug 05, 2013, 11:30 am ESTSnowden revealed that NSA designed a system called XKeyscore considered the "widest-reaching" architecture for developing intelligence from the internet.XKeyscore, NSA former technicians Edward Snowden revealed that the agency has another secret program to spy on user's Internet experience tracking practically every...

Superfecta report Q2 2013, constant increase for automated attacks

0
Aug 01, 2013, 11:30 am ESTFireHost Secure cloud hosting company issued Q2 2013 Superfecta report that revealed a sharp increase in blended, automated attacks.FireHost announced the Q2 2013 Superfecta report, an interesting set of statistic related to attacks against web applications. The Superfecta is...

Black Hat USA 2013 – Insider Only Content

0
Pictures found here:   http://www.flickr.com/photos/blackhatevents/ Keynotes, Whitepapers and Presentations found here: https://www.blackhat.com/us-13/archives.htmlshhhhhh...it's a secret - don't tell anyone, ok?

New Best Practices for Detecting Malware in the 21st Century

0
Jul 31, 2013, 11:30 am ESTBy Stephen Newman, Vice President of Products, DamballaDetecting malicious network behavior isn’t as straightforward as it used to be. Organizations can no longer rely on their signature-based antivirus and intrusion detection systems to detect...

STAY CONNECTED

35,320FansLike
55,539FollowersFollow